Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smartphones

RSS Feed    Add to Google    Add to My Yahoo!
Smartphones Reports
 
How to Securely Integrate Mobility into Your Organization
sponsored by Accelerite
EGUIDE: In this expert guide, Brian Katz offers advice to help businesses choose the right vendor to meet their needs. As a bonus, you'll learn how wearables will start to affect the business world, and what to do about it.
Posted: 29 May 2015 | Published: 29 May 2015

Accelerite

Enterprise Mobility Best Practices: MDM, Containerization or Both?
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights a few enterprise mobility management (EMM) use cases, and defines the advantages of MDM, containerization, and the layered approach to security that both can provide. Access this now to enable enhanced business processes.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

VMware, Inc.

EMM Report Card: 10 Mobility Suites to Keep an Eye On
sponsored by IBM
WHITE PAPER: This white paper examines and compares 10 of the top EMM suites to look out for, highlighting the pros and cons to each. Read on to find out which dynamic suite best stacks up when it comes to the EMM magic quadrant of features.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

IBM

Mobilize Your Windows Apps
sponsored by Citrix
WHITE PAPER: This white paper discusses the concept of application virtualization and demonstrates how application virtualization can enhance mobile app management.
Posted: 16 Apr 2015 | Published: 31 Dec 2014

Citrix

The Secure Mobile Enterprise
sponsored by Dell, Inc.
VIDEO: This video describes how you can achieve the goal of creating a secure mobile enterprise.
Posted: 15 Jul 2015 | Premiered: 15 Jul 2015

Dell, Inc.

How to Create a Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: This white paper explores how a secure mobile enterprise increases productivity and collaboration while opening the doors to business transformation, competitive advantage and improved performance.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

Secure by Design: Balancing Security with Employee Productivity
sponsored by Citrix
WHITE PAPER: This white paper explores an app virtualization solution that addresses today's growing IT security challenges while giving users fast, simple, and flexible remote access.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Citrix

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can make sure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

BlackBerry

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015

Lookout
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement